000 04157nam a22006375i 4500
001 978-3-319-51046-0
003 DE-He213
005 20240730164811.0
007 cr nn 008mamaa
008 161217s2017 sz | s |||| 0|eng d
020 _a9783319510460
_9978-3-319-51046-0
024 7 _a10.1007/978-3-319-51046-0
_2doi
050 4 _aQA75.5-76.95
072 7 _aUYA
_2bicssc
072 7 _aCOM014000
_2bisacsh
072 7 _aUYA
_2thema
082 0 4 _a004.0151
_223
245 1 0 _aConcurrency, Security, and Puzzles
_h[electronic resource] :
_bEssays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday /
_cedited by Thomas Gibson-Robinson, Philippa Hopcroft, Ranko Lazić.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aXVIII, 319 p. 58 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aProgramming and Software Engineering,
_x2945-9168 ;
_v10160
505 0 _aBill Roscoe, on his 60th Birthday -- A Tribute to Bill Roscoe, on the Occasion of his 60th Birthday -- Herding Cats, Oxford Style -- Stealthy Protocols: Metrics and Open Problems -- A Specification Theory of Real-Time Processes -- Towards Verification of Cyber-Physical Systems with UTP and Isabelle/HOL -- FDR: From Theory to Industrial Application -- Information Flow, Distributed Systems, and Refinement, by Example -- Abstractions for Transition Systems with Applications to Stubborn Sets -- A Hybrid Relational Modelling Language -- What Makes Petri Nets Harder to Verify: Stack or Data -- Analysing Lock-Free Linearizable Datatypes Using CSP -- Discrete Random Variables over Domains, Revisited -- A Demonic Lattice of Information -- A Brief History of Security Protocols -- More Stubborn Set Methods for Process Algebras -- A Branching Time Model of CSP -- Virtualization Based Development. .
520 _aThis festschrift was written in honor of Andrew William (Bill) Roscoe on the occasion of his 60th birthday, and features tributes by Sir Tony Hoare, Stephen Brookes, and Michael Wooldridge. Bill Roscoe is an international authority in process algebra, and has been the driving force behind the development of the FDR refinement checker for CSP. He is also world renowned for his pioneering work in analyzing security protocols, modeling information flow, human-interactive security, and much more. Many of these areas are reflected in the 15 invited research articles in this festschrift, and in the presentations at the "BILL-60" symposium held in Oxford, UK, on January 9 and 10, 2017.
650 0 _aComputer science.
_99832
650 0 _aSoftware engineering.
_94138
650 0 _aCompilers (Computer programs).
_93350
650 0 _aMachine theory.
_986141
650 0 _aComputer networks .
_931572
650 0 _aComputer programming.
_94169
650 1 4 _aComputer Science Logic and Foundations of Programming.
_942203
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aCompilers and Interpreters.
_931853
650 2 4 _aFormal Languages and Automata Theory.
_986144
650 2 4 _aComputer Communication Networks.
_986146
650 2 4 _aProgramming Techniques.
_986148
700 1 _aGibson-Robinson, Thomas.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_986150
700 1 _aHopcroft, Philippa.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_986151
700 1 _aLazić, Ranko.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_986153
710 2 _aSpringerLink (Online service)
_986156
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319510453
776 0 8 _iPrinted edition:
_z9783319510477
830 0 _aProgramming and Software Engineering,
_x2945-9168 ;
_v10160
_986157
856 4 0 _uhttps://doi.org/10.1007/978-3-319-51046-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c85910
_d85910